service-mesh-implementation

Implement service mesh (Istio, Linkerd) for service-to-service communication, traffic management, security, and observability.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "service-mesh-implementation" with this command: npx skills add aj-geddes/useful-ai-prompts/aj-geddes-useful-ai-prompts-service-mesh-implementation

Service Mesh Implementation

Table of Contents

Overview

Deploy and configure a service mesh to manage microservice communication, enable advanced traffic management, implement security policies, and provide comprehensive observability across distributed systems.

When to Use

  • Microservice communication management
  • Cross-cutting security policies
  • Traffic splitting and canary deployments
  • Service-to-service authentication
  • Request routing and retries
  • Distributed tracing integration
  • Circuit breaker patterns
  • Mutual TLS between services

Quick Start

Minimal working example:

# istio-setup.yaml
apiVersion: v1
kind: Namespace
metadata:
  name: istio-system
  labels:
    istio-injection: enabled

---
apiVersion: install.istio.io/v1alpha1
kind: IstioOperator
metadata:
  name: istio-config
  namespace: istio-system
spec:
  profile: production
  revision: "1-13"

  components:
    pilot:
      k8s:
        resources:
          requests:
            cpu: 500m
            memory: 2048Mi
// ... (see reference guides for full implementation)

Reference Guides

Detailed implementations in the references/ directory:

GuideContents
Istio Core SetupIstio Core Setup
Virtual Service and Destination RuleVirtual Service and Destination Rule
Security PoliciesSecurity Policies
Observability ConfigurationObservability Configuration
Service Mesh Deployment ScriptService Mesh Deployment Script

Best Practices

✅ DO

  • Enable mTLS for all workloads
  • Implement proper authorization policies
  • Use virtual services for traffic management
  • Enable distributed tracing
  • Monitor resource usage (CPU, memory)
  • Use appropriate sampling rates for tracing
  • Implement circuit breakers
  • Use namespace isolation

❌ DON'T

  • Disable mTLS in production
  • Allow permissive traffic policies
  • Ignore observability setup
  • Deploy without resource requests/limits
  • Skip sidecar injection validation
  • Use 100% sampling in high-traffic systems
  • Mix service versions without proper routing
  • Neglect authorization policies

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

api-security-hardening

No summary provided by upstream source.

Repository SourceNeeds Review
Security

security-compliance-audit

No summary provided by upstream source.

Repository SourceNeeds Review
Security

security-testing

No summary provided by upstream source.

Repository SourceNeeds Review
Security

web-performance-audit

No summary provided by upstream source.

Repository SourceNeeds Review